Tweakable SM4: How to tweak SM4 into tweakable block ciphers?

被引:1
|
作者
Guo, Zhenzhen [1 ,2 ]
Wang, Gaoli [1 ,2 ]
Dunkelman, Orr [3 ]
Pan, Yinxue [1 ]
Liu, Shengyuan [1 ]
机构
[1] East China Normal Univ, Software Engn Inst, Shanghai Key Lab Trustworthy Comp, Shanghai 200062, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Bengjing 100878, Peoples R China
[3] Univ Haifa, Comp Sci Dept, Haifa, Israel
基金
中国国家自然科学基金;
关键词
Tweakable block cipher; SM4; TNT; MILP; CRYPTANALYSIS; BLOCKCIPHERS; ROUNDS; MODES;
D O I
10.1016/j.jisa.2022.103406
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
SM4 is China's commercial block cipher standard and an ISO/IEC international standard. While SM4 withstood a great deal of analysis, its non-tweakable structure makes it inflexible. In this paper, we study three different methods to turn SM4 into a tweakable block cipher. Based on the Tweak-aNd-Tweak (TNT) introduced by Bao et al. at EUROCRYPT 2020, we propose the first scheme, called TNT-SM4, which can be treated as an instantiation of TNT. For comparative analysis, the 128 and 32 bits tweaks are both adopted, which is denoted as TNT-SM4-128 and TNT-SM4-32, respectively. By taking full advantage of the structural characteristics of SM4, we also propose the second method, which studies how to tweak SM4 into a tweakable block cipher in a direct way. With the design goal of reducing the design, security evaluation, and implementation costs, we use SM4 as is and attach a lightweight linear tweak schedule to it. The biggest challenge is to find the best insertion location for tweaks in both aspects of security and efficiency. We extensively utilize mixed integer linear programming (MILP) to perform a comprehensive search. The third method adopts the same tweak schedule as the key schedule of SM4, which is equivalent to one more key schedule for SM4. We analyze the security of the three schemes, focusing on related-key and related-tweak attacks, and provide a comparative analysis of the three schemes. The results show that our schemes are secure, and a better scheme that makes SM4 more flexible is obtained from the comparison of the three schemes.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] Cryptanalysis of Two White-Box Implementations of the SM4 Block Cipher
    Lu, Jiqiang
    Li, Jingyu
    INFORMATION SECURITY (ISC 2021), 2021, 13118 : 54 - 69
  • [32] Quantum circuit implementations of SM4 block cipher optimizing the number of qubits
    Luo, Qing-bin
    Li, Qiang
    Li, Xiao-yu
    Yang, Guo-wu
    Shen, Jinan
    Zheng, Minghui
    QUANTUM INFORMATION PROCESSING, 2024, 23 (05)
  • [33] An Optimized Isomorphic Design for the SM4 Block Cipher Over the Tower Field
    Wang, Chuang
    Ding, Yan
    Huang, Chenlin
    Song, Liantao
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 428 - 434
  • [34] New Second-order Threshold Implementation of Sm4 Block Cipher
    Shao, Tianyi
    Wei, Bohua
    Ou, Yu
    Wei, Yongzhuang
    Wu, Xiaonian
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2023, 39 (04): : 435 - 445
  • [35] SM4的快速软件实现技术
    郎欢
    张蕾
    吴文玲
    中国科学院大学学报, 2018, 35 (02) : 180 - 187
  • [36] Optimizing the SM4 Encryption Algorithm for Blockchain Security
    Hu, Xiaomeng
    Yi, Haibo
    Zhang, Wenyu
    Du, Yaning
    BLOCKCHAIN TECHNOLOGY AND APPLICATION, CBCS 2023, 2024, 2098 : 31 - 45
  • [37] A secure white-box SM4 implementation
    Bai, Kunpeng
    Wu, Chuankun
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (10) : 996 - 1006
  • [38] GPU上SM4算法并行实现
    李秀滢
    吉晨昊
    段晓毅
    周长春
    信息网络安全, 2020, 20 (06) : 36 - 43
  • [39] S-box Optimization for SM4 Algorithm
    Zhu, Yuan
    Zhou, Fang
    Wu, Ning
    Yasir
    WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, WCECS 2017, VOL I, 2017, : 21 - 25
  • [40] Authenticated Encryption Based on SM4 Round Function
    Zhang J.
    Wu W.-L.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2018, 46 (06): : 1294 - 1299